Integrity & Compliance
How We Share Data
At Teton Analytics, we deeply value the trust our customers place in us when it comes to data sharing. As the holder of an extensive de-identified health data set, we carefully manage how this data is accessed and used. We extend a limited, non-exclusive, non-transferable license to our customers, allowing them to use this data solely for the purposes outlined in our agreement. This means that our customers can utilize our data to drive their research and analysis, but are not permitted to use or disclose it beyond these agreed-upon parameters.
Secure File Transfer
Our focus is always on ensuring the highest levels of data security and compliance. As such, our customers are not permitted to modify, re-identify, or share the data in any way that violates our agreement. Our data delivery method, Secure File Transfer Protocol (SFTP), is designed to safeguard against unauthorized access, further protecting the integrity of our data. Moreover, our customers are obligated to use appropriate safeguards to prevent any use or disclosure of the licensed data outside of the agreement.
HIPAA
We want to assure our customers that all rights, titles, and interest in the licensed data remain with Teton Analytics and/or its licensors. This ensures that our intellectual property rights are protected, and that the data remains confidential and secure. If any use or disclosure of the data outside of our agreement were to occur, we require immediate notification and we maintain full compliance with applicable laws and regulations, including the Health Insurance Portability and Accountability Act (HIPAA). By choosing Teton Analytics, you can trust that your data sharing is managed responsibly, securely, and in full compliance with the law.
Data Destruction
At Teton Analytics, we uphold a rigorous standard for data management, which extends beyond usage to include secure and thorough data destruction upon the conclusion of our agreement. Our respect for your trust in us and adherence to data privacy mandates prompt us to meticulously follow a process to ensure complete erasure and destruction of data post agreement expiration or termination.
Upon the conclusion of an agreement, we mandate the cessation of all usage of confidential information. All documents and tangible materials containing or reflecting confidential information are systematically destroyed. Moreover, to reinforce data security, confidential information is permanently deleted from computer systems. However, for compliance with laws or to maintain backups and archives, some information may be retained in its current state until deleted in due course. This retained information is strictly bound by the confidentiality clauses in our agreement.
Lastly, we appreciate the need for verification and closure. Thus, after termination, all rights, licenses, consents, and authorizations granted by Teton Analytics are deemed void. Any licensed data should be returned immediately to Teton Analytics, and no copies should be retained by the licensee. We require a certified proof of destruction of any licensed data and tokens previously in the licensee’s possession. This proof should be furnished within seven days of the agreement’s termination or expiration, ensuring a clear and secure end to our data partnership.